نتایج جستجو برای: asymmetric verifiability
تعداد نتایج: 66461 فیلتر نتایج به سال:
iii Preface Hundreds or even thousands of international legal instruments on "the environment" are in existence. What happens to international environmental agreements once they are signed, and how does the process of implementing such agreements influence their effectiveness? These are the questions that motivate the IIASA project "Implementation and Effectiveness of International Environmenta...
SUMMARY Multisignature scheme realizes that plural users generate the signature on a message, and that the signature is verified. Various studies on multisignature have been proposed([2], [6], [11], [15], [18]). They are classified into two types: RSA([13])-based multisignature([6], [11]), and discrete logarithm problem(DLP) based multisig-nature([2], [15], [18]), all of which assume that a mes...
Numerous metrics have been developed that attempt to assess the reliability of phylogenetic trees. Several of these commonly used measures of tree and tree branch support are described and discussed in the context of their relationship to Popperian corroboration. Claims that measures of support indicate the accuracy of phylogenetic trees or provide information for tree choice are rebutted. Meas...
The Helios voting scheme is well studied including formal proofs for verifiability and ballot privacy, but it does not provide participation privacy (i.e. it reveals who participated in the election). Kulyk, Teague and Volkamer proposed an extension to Helios that is claimed to provide ballot privacy as well as participation privacy while providing verifiability against a malicious bulletin boa...
After the trials of remote internet voting for local elections in 2011 and parliamentary elections in 2013, a number of local referendums has renewed interest in internet voting in Norway. The voting scheme used in Norway is not quantum-safe and it has limited voter verifiability. In this case study, we consider how we can use fully homomorphic encryption to construct a quantum-safe voting sche...
When developing a catalogue of technical requirements for online voting systems to be used in legally ruled, non-parliamentary elections, major interdisciplinary problems arise which currently cannot be solved. Technical requirements are not yet definable due to lacking legal preconditions, and legal definitions are not yet definable due to lacking technical experience. Problems of this type ar...
We present a Solidity smart contract implementation of the TAVS e-voting protocol. The Two Authorities Electronic Voting Scheme (TAVS) is voting scheme that achieves universal verifiability with reduced time-complexity both for elector and system. security derives from RSA cryptosystem it employs, assumption two entities do not share information. which replaces one these an immutable in Ethereu...
throughout the years, philosophers and psychologists have striven to solve the mind-boggling question of learning by juxtaposing the two competing theories, namely, empiricism and rationalism. they have usually opted for one and ruled out the other on the grounds that it cannot account for learning because theoretical and empirical evidence discredits it. since 1965, with the publication of cho...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید